Feeds

Police data leak case clashes with Durant judgment

Jilted lover's sister traces policeman-ex

Top three mobile application threats

A police employee has been found guilty of using police systems to pass on information about a policeman to his jilted lover. Jacqueline Rooney breached the Data Protection Act, the criminal appeals court found.

The judgment clashes with a recent verdict which seemed to define personal information very narrowly, according to a lawyer specialising in data protection law. Sue Cullen, of Pinsent Masons, the law firm behind OUT-LAW, said that the Rooney case depended on a fairly broad definition of personal information.

A previous case had involved an individual, Michael Durant, who sought to use the Data Protection Act to obtain copies of information held about himself by the Financial Services Authority (FSA). Cullen said that in that case the definition of what constituted personal information was much more narrowly drawn than in Rooney's case.

"When it was someone looking for information from the FSA it was a narrow definition: the court said 'no, that is not personal information'," said Cullen. "But when it is a criminal case involving misuse of personal data the court used a very wide definition of personal data, which is interesting."

Rooney worked in human resources for Staffordshire Police where she had access to personal information about employees which the force needed for police-related purposes. Rooney's sister was in a relationship with one of the police officers, Adam Syred.

When that relationship broke down and Syred moved in with another officer Rooney looked up the couple's address and told her sister that they had moved to Tunstall. The sister then telephoned Syred to say that she knew about the move.

Rooney argued that although she had checked the information on the system it was as part of her duties and that she did not pass the information on to her sister. A jury at Birmingham Crown Court convicted her and she appealed. The Criminal Appeals Court has just dismissed her appeal.

Cullen said that this judgment appeared to clash with that in the case of Durant, who lost his case in 2003. In that case he sought copies of information held on him by the FSA. The court found in the FSA's favour, supporting its case for a narrow interpretation of what constitutes personal data, and therefore a lighter information provision burden for organisations.

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Build a business case: developing custom apps

More from The Register

next story
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
Philip K Dick 'Nazi alternate reality' story to be made into TV series
Amazon Studios, Ridley Scott firm to produce The Man in the High Castle
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.